CVE-2024-28537

9.8 CRITICAL

📋 TL;DR

This CVE describes a stack overflow vulnerability in Tenda AC18 routers that allows remote attackers to execute arbitrary code or cause denial of service. The vulnerability exists in the fromNatStaticSetting function's page parameter handling. Users with Tenda AC18 routers running vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Tenda AC18
Versions: V15.03.05.05
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects this specific firmware version. Other Tenda models or versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network takeover, and lateral movement to connected devices.

🟠

Likely Case

Router crash/reboot causing network disruption, or limited code execution allowing attacker persistence on the device.

🟢

If Mitigated

Denial of service only if exploit attempts are blocked but overflow still triggers.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with web interfaces accessible from WAN.
🏢 Internal Only: MEDIUM - Attackers could exploit from internal network if they gain access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains proof-of-concept. Stack overflow vulnerabilities in embedded devices often have reliable exploitation paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Tenda website for firmware updates. 2. If update available, download and install via router web interface. 3. Reboot router after installation.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router web interface

Access router admin panel → System Tools → Remote Management → Disable

Network segmentation

all

Isolate router management interface from untrusted networks

🧯 If You Can't Patch

  • Replace router with different model/brand that receives security updates
  • Place router behind firewall with strict inbound rules blocking web interface access

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or System Tools → Firmware Upgrade

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify firmware version is different from V15.03.05.05 after update

📡 Detection & Monitoring

Log Indicators:

  • Repeated connection attempts to router web interface
  • Unusual POST requests to NAT configuration endpoints
  • Router crash/reboot logs

Network Indicators:

  • Unusual traffic to router port 80/443 from external IPs
  • HTTP requests with long parameters to /goform/NatStaticSetting

SIEM Query:

source_ip:external AND dest_ip:router_ip AND (http_uri:"/goform/NatStaticSetting" OR http_user_agent_contains:"exploit")

🔗 References

📤 Share & Export